Blog

Latest articles from SOCRadar

June 19, 2020

Types of Threat Intelligence Gathering

For better security functioning, all organizations need reliable but also real-time cyber threat intelligence. Producing threat intelligence is a complex process and goes through a 5-staged cycle. We have previously written a blog explaining each… Continue Reading

by
June 11, 2020

5 Stages of The Threat Intelligence Lifecycle

Real-time and reliable cyber threat intelligence is essential for the security functions of organizations. It is leveraged by organizations of different sizes to understand adversary behavior and stay prepared for emerging threats. Producing it is… Continue Reading

by
June 4, 2020

SOCRadar Recognized by Gartner in Market Guide for Security Threat Intelligence Products and Services 2020

PRESS RELEASE | Istanbul, TR / Fairfax, VA | June 3, 2020 We're proud to announce our inclusion in the Gartner's Market Guide for Security Threat Intelligence Products and Services 2020 [1] SOCRadar is one… Continue Reading

by
June 3, 2020

The Difference Between Data, Information and Intelligence

Data. Information. Intelligence. Oftentimes confused by people, these very different terms can not be used interchangeably but have a tight connection between each other. The order goes like this: Data is collected, then assembled into… Continue Reading

by
May 29, 2020

10 GitHub Security Best Practices

GitHub is a standard when it comes to sharing code among developers. It is the most essential platform used by developers in every company, and despite the broad usage, there are still bad practices made… Continue Reading

by
May 20, 2020

10 Best Dark / Deep Web Browsers for Anonymity

The Deep Web is the underground of the whole web. Accessing it is not quite difficult, but you need to follow some basic steps in order to retain your privacy. We previously wrote a blog… Continue Reading

by
May 17, 2020

How to (Safely) Access the Deep Web and Darknet

You have definitely heard there is a deep side to the internet where not everyone can access it. That is considered by many as hazardous and even illegal. We have prepared this blog post to… Continue Reading

by
May 7, 2020

Tools and Features that can be Used to Detect Sensitive Data Leaks from Github – Part 2

In part 1 of this blog series, we discussed a few popular osint tools that help developer’s find leaked information from their GitHub projects: GitGrabber, GitLeaks, Gitminer, Gitrob. In this part, we will continue with… Continue Reading

by
April 30, 2020

Tools and Features that can be Used to Detect Sensitive Data Leaks from Github – Part 1

Back in the time when there was no Github, developers used to share codes in local servers of the company, or even with flash drives. But imagine you are out of the company’s LAN and… Continue Reading

by
April 15, 2020

Did Zoom really get hacked?

Zoom Video Communications Inc.’s video conferencing app, has seen a booming popularity since COVID-19 outbreaks began in January 2020. Zoom usage rose after lockdowns with corporate office workers, students, millions of people who #stayhome and… Continue Reading

by
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo